Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-08_8e86ef9c7c3301516591885a87972305_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-08_8e86ef9c7c3301516591885a87972305_mafia.exe
Resource
win10v2004-20240226-en
Target
2024-04-08_8e86ef9c7c3301516591885a87972305_mafia
Size
544KB
MD5
8e86ef9c7c3301516591885a87972305
SHA1
65bb16e753b2f0a74c50c3d825d96645f3903158
SHA256
0e0bfaf789275cb381a6dbd4c78473f1c129662c8a65d1e409f6c98ca159036b
SHA512
1d83c312d13b398ae691865162fda5be7311b59690cbf65395e2941808c23e8115426b28158bc73b6b47a502d7c20ab57b5d9b6fd2fd21cbbc43dd36f1a63969
SSDEEP
12288:19YlKvQthRCqC3B20BEu4QWlQnhiMd3zkHXi47oHjOPzc1qnuapho4Ht:19jvQtQrnhiMd3zk3i4YSPzc1+uaphNN
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\dev\tags\rev-3.46\apps\win\Release\Win32\FBWMgr.pdb
GetModuleFileNameExW
GetProcessMemoryInfo
TlsFree
GetModuleFileNameW
LoadLibraryW
GetProcAddress
FreeLibrary
GetStartupInfoW
CreateProcessW
OpenProcess
GetExitCodeProcess
CreateMutexW
GetCommandLineW
SetConsoleCtrlHandler
Sleep
PostQueuedCompletionStatus
InterlockedExchangeAdd
EnterCriticalSection
GetLastError
InterlockedExchange
LeaveCriticalSection
SetEvent
CreateEventA
InterlockedDecrement
InterlockedIncrement
CloseHandle
GetCurrentProcessId
ProcessIdToSessionId
GetTempPathW
CreateWaitableTimerA
ResumeThread
ResetEvent
OpenEventA
FormatMessageA
LocalFree
SetEndOfFile
SetStdHandle
CreateFileA
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
HeapSize
ExitProcess
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
FindResourceExW
FindResourceW
LoadResource
SizeofResource
CreateFileW
LockResource
DeleteFileW
GetFileSize
SetFilePointer
GetModuleHandleW
WriteFile
ReadFile
FlushFileBuffers
MultiByteToWideChar
WideCharToMultiByte
SystemTimeToFileTime
GetVolumeInformationW
GetProcessHeap
HeapFree
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
CreateIoCompletionPort
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
QueueUserAPC
TerminateThread
GetQueuedCompletionStatus
SetWaitableTimer
ReleaseSemaphore
CreateSemaphoreA
TlsSetValue
TlsGetValue
InterlockedCompareExchange
SetLastError
WaitForSingleObject
WaitForMultipleObjects
SleepEx
CreateEventW
DuplicateHandle
GetCurrentProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
HeapSetInformation
WriteConsoleW
GetFileType
GetStdHandle
ExitThread
GetCurrentThreadId
CreateThread
HeapReAlloc
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetLocaleInfoW
HeapCreate
HeapDestroy
GetForegroundWindow
IsWindow
GetWindowThreadProcessId
GetWindowTextLengthW
GetClassNameW
IsWindowVisible
GetWindowRect
PostMessageA
SetWindowPos
SetForegroundWindow
IsIconic
ShowWindow
GetKeyboardState
keybd_event
GetWindowTextW
FindWindowExW
EnumChildWindows
RegDeleteValueW
RegQueryValueExW
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
GetUserNameW
RegSetValueExW
CommandLineToArgvW
SHGetFolderPathW
PathAddBackslashW
PathFileExistsW
ioctlsocket
setsockopt
WSASend
closesocket
WSASetLastError
WSAGetLastError
WSAStringToAddressA
ntohs
htons
shutdown
getsockname
bind
listen
ntohl
gethostname
WSAStartup
WSACleanup
htonl
WSASocketW
getsockopt
select
connect
getaddrinfo
freeaddrinfo
WSARecv
GetAcceptExSockaddrs
AcceptEx
GetAdaptersInfo
InternetCrackUrlA
CoCreateInstance
VariantInit
SysAllocString
SysFreeString
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ